COMPUTING SYSTEM WITH PROTOCOL PROTECTION MECHANISM AND METHOD OF OPERATION THEREOF
First Claim
Patent Images
1. A computing system comprising:
- a control unit configured to;
determine a protocol profile including a first protocol and a second protocol for communicating between a first device and a second device,generate a unified-protocol privacy mechanism for a privacy protection scenario, the unified-protocol privacy mechanism based on combining the first protocol and the second protocol; and
a communication unit, coupled to the control unit, configured to communicate content information according to the unified-protocol privacy mechanism between the first device and the second device.
1 Assignment
0 Petitions
Accused Products
Abstract
A computing system includes: a control unit configured to: determine a protocol profile including a first protocol and a second protocol for communicating between a first device and a second device, generate a unified-protocol privacy mechanism for a privacy protection scenario, the unified-protocol privacy mechanism based on combining the first protocol and the second protocol; and a communication unit, coupled to the control unit, configured to communicate content information according to the unified-protocol privacy mechanism between the first device and the second device.
-
Citations
20 Claims
-
1. A computing system comprising:
-
a control unit configured to; determine a protocol profile including a first protocol and a second protocol for communicating between a first device and a second device, generate a unified-protocol privacy mechanism for a privacy protection scenario, the unified-protocol privacy mechanism based on combining the first protocol and the second protocol; and a communication unit, coupled to the control unit, configured to communicate content information according to the unified-protocol privacy mechanism between the first device and the second device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of operation of a computing system comprising:
-
determining a protocol profile including a first protocol and a second protocol for communicating between a first device and a second device; generating a unified-protocol privacy mechanism with a control unit for a privacy protection scenario, the unified-protocol privacy mechanism based on combining the first protocol and the second protocol; and communicating content information according to the unified-protocol privacy mechanism between the first device and the second device. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory computer readable medium including instructions for a computing system comprising:
-
determining a protocol profile including a first protocol and a second protocol for communicating between a first device and a second device; generating a unified-protocol privacy mechanism for a privacy protection scenario, the unified-protocol privacy mechanism based on combining the first protocol and the second protocol; and communicating content information according to the unified-protocol privacy mechanism between the first device and the second device. - View Dependent Claims (17, 18, 19, 20)
-
Specification